Societal impact 3

Societal impact 3

10th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science: Malware

AQA GCSE Computer Science: Malware

10th - 11th Grade

13 Qs

Technology and Education

Technology and Education

9th - 12th Grade

10 Qs

Chapter-8: Safety and security

Chapter-8: Safety and security

9th - 10th Grade

10 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Competencias Digitales Quiz

Competencias Digitales Quiz

12th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

Societal impact 3

Societal impact 3

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Suman Joshi

Used 60+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "Intellectual property Rights" covers :

Copyrights

Trademarks

Patents

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Online personal account, personal websites are examples of :

Digital Wallet

Digital Property

Digital Certificate

Digital Signature

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Using someone else's twitter handle to post something will be termed as :

Fraud

Identity Theft

Online stealing

Violation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a/an open-source software?

Microsoft Windows

Adobe Photoshop

Mysql

Ms Powerpoint

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Domain Software is free and can be used with restrictions:

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-document becomes legal after it is digitally signed.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ability to control what information one reveals about oneself over the internet is called __________________

Privacy

Security

Phishing

Web bug

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Obtaining files that you don't have the right to use from the internet is called ____________________

Phishing

Hacking

Illegal Downloading

Spam